CVE-2025-30269
Use of Externally-Controlled Format String in Qsync Central Allows Data Exposure
Publication date: 2026-02-11
Last updated on: 2026-02-11
Assigner: QNAP Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qnap | qsync_central | From 5.0.0.0 (inc) to 5.0.0.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-134 | The product uses a function that accepts a format string as an argument, but the format string originates from an external source. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker to access secret data or alter memory, potentially leading to unauthorized information disclosure or system instability.
Can you explain this vulnerability to me?
This vulnerability is a use of externally-controlled format string issue affecting Qsync Central. It allows a remote attacker who has gained a user account to exploit the vulnerability to obtain secret data or modify memory.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update Qsync Central to version 5.0.0.4 or later, as the vulnerability has been fixed in that release.
Additionally, restrict remote attacker access by limiting user account permissions and monitoring for suspicious activity.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know